
Practical Linux Privilege Escalation (With Ctf Challenges)
Published 8/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 11.70 GB | Duration: 14h 35m
Learn how to Enumerate a Linux System to find and exploit Privilege Escalation attack vectors with hands-on exercises.
What you'll learn
Introduction to the Linux Operating System
Introduction to the Linux Shell
Learn how to enumerate a Linux System
Learn how to perform privilege escalation on a Linux System
Learn the fundamentals of Binary Exploitation in Linux
Requirements
Basic general computer knowledge
Description
The Linux OS plays a foundational role in powering the servers that run the internet of today.- How do you make sure that a Linux deployment is secure?- How do you make sure that it does not contain miss-configurations that could allow a user to escalate privileges and become the administrator (root) user?This course covers the most useful techniques you need to know in order to enumerate a modern Linux OS deployment to find and exploit Privilege Escalation attack vectors.Consider these questions:- Are you interested in working in the security industry?- Do you want to learn how to test the security of a Linux OS deployment?- Do you like hands-on, practice-based learning?If you answered yes to these questions, then this course is for you.In this course I will show you how to test the security of a Linux OS deployment. For each technique covered, I have prepared custom exercises in the form of hands-on CTF challenges that will challenge your understanding and bring it to the next level.Feel free to check out the table of contents in order to understand the arguments covered.Thank you very much, and for any questions, critisim and feedback, you can always write to me.
Overview
Section 1: Introduction
Lecture 1 whoami
Lecture 2 Learning objectives
Lecture 3 Required Knowledge
Lecture 4 How to work with the exercises
Section 2: Introduction to Linux
Lecture 5 What is an Operating System?
Lecture 6 The History of Linux
Lecture 7 Linux Distributions
Lecture 8 Build your own Linux!
Section 3: Introduction to the Linux Shell
Lecture 9 On the Linux Shell
Lecture 10 Linux File System
Lecture 11 Basic Shell Commands
Lecture 12 File System Commands
Lecture 13 Linux File System Permissions
Lecture 14 Linux Permission Commands
Lecture 15 User Management Commands
Lecture 16 Resource Management Commands
Lecture 17 Package Management Commands
Section 4: Offensive Remote Shell Access
Lecture 18 Remote Shell Access
Lecture 19 File Transfer Commands
Lecture 20 Bind Shell
Lecture 21 Reverse Shell
Lecture 22 Upgrade your Reverse Shell
Section 5: Linux Enumeration
Lecture 23 System Enumeration
Lecture 24 Cronjobs Enumeration
Lecture 25 Capabilities Enumeration
Lecture 26 Services Enumeration
Section 6: Linux Privilege Escalation
Lecture 27 PATH Hijacking
Lecture 28 PATH Hijacking Exercises
Lecture 29 SUID Exploitation
Lecture 30 SUID Exploitation Exercises
Lecture 31 SUDO Exploitation
Lecture 32 SUDO Exploitation Exercises
Lecture 33 Wildcard Expansion Exploitation
Lecture 34 Wildcard Expansion Exploitation Exercises
Lecture 35 Password Cracking
Lecture 36 Password Cracking Exercises
Section 7: Linux Binary Exploitation
Lecture 37 Learn how to Debug with GDB
Lecture 38 Calling Conventions in x86 and x86_64
Lecture 39 Stack Frames
Lecture 40 Simple Stack Overflow - 32 bit
Lecture 41 Memory Protection Mechanisms
Lecture 42 Format String Vulnerabilities
Lecture 43 Using Pwntools to Automate Exploitation
Lecture 44 Introduction to Ret2libc
Lecture 45 Ret2libc 32 bit without ASLR Bypass
Lecture 46 Ret2libc 64 bit without ASLR Bypass
Lecture 47 Automate Ret2libc with Pwntools
Lecture 48 Ret2libc 64 bit with ASLR Bypass
Lecture 49 Ret2libc Exercises
Lecture 50 Kernel Exploit - Dirty COW
Section 8: Conclusion
Lecture 51 Next Steps
Cybersecurity enthusiasts curious about Linux Privilege Escalation,Cybersecurity enthusiasts curious about Linux Binary Exploitation,People interested in working in the security industry,People interested about security in general

NitroFlare
https://nitroflare.com/view/2838711ABD43791/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part01.rar https://nitroflare.com/view/E0EBFB34212D3CA/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part02.rar https://nitroflare.com/view/BF5E77D4996A74A/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part03.rar https://nitroflare.com/view/5D1C7A7AC22A534/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part04.rar https://nitroflare.com/view/81243C98D89A640/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part05.rar https://nitroflare.com/view/ECD1D6B51CA7C3C/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part06.rar https://nitroflare.com/view/C0B3F6E6D35D1F1/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part07.rar https://nitroflare.com/view/119E018749A0F2A/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part08.rar https://nitroflare.com/view/281025F824D1374/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part09.rar https://nitroflare.com/view/DB55DA76827DF49/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part10.rar
DDownload
https://ddownload.com/zko0u0223df5/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part01.rar https://ddownload.com/h1jiz54i8vcn/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part02.rar https://ddownload.com/lm1q1ug5q8xu/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part03.rar https://ddownload.com/0sp54uctqfei/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part04.rar https://ddownload.com/88qu3nb6ql7r/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part05.rar https://ddownload.com/okoqfh36jhfq/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part06.rar https://ddownload.com/lcjx018apmmi/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part07.rar https://ddownload.com/kxmat5z765x8/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part08.rar https://ddownload.com/izpaq7pbx0qn/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part09.rar https://ddownload.com/ztw7ni98px7p/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part10.rar
